FBI software cracks encryption wall
November 20, 2001 8:42 PM Subscribe
FBI software cracks encryption wall The FBI is developing software capable of inserting a computer virus onto a suspect’s machine and obtaining encryption keys...
I guess the only way around this is to copy your encrypted email onto a floppy aThat, or use a secure/obscure operating system. I doubt that they'll port their software to OS/2 Warp.
posted by holloway at 9:01 PM on November 20, 2001
If they can't insert the virus, they'll just have to get a warrant as in the Scarfo case and sneak in overnight to install the keylogger themselves.
The question I have is how they would make it virus-deployable, but keep the virus from spreading. Technically it wouldn't be a virus, but a one-time Trojan, though, from the description. If it doesn't spread, antivirus companies won't likely ever find it in the wild.
posted by dhartung at 9:35 PM on November 20, 2001
The question I have is how they would make it virus-deployable, but keep the virus from spreading. Technically it wouldn't be a virus, but a one-time Trojan, though, from the description. If it doesn't spread, antivirus companies won't likely ever find it in the wild.
posted by dhartung at 9:35 PM on November 20, 2001
"how they would make it virus-deployable" perhaps it is tailor-made, so to say, for a certain system.
posted by clavdivs at 7:10 AM on November 21, 2001
posted by clavdivs at 7:10 AM on November 21, 2001
First, security through obscurity rarely works. Look at the telco switching systems--obscure, difficult to find, but hacked nonetheless. Secondly, keyloggers have been around forever. If these recent cases were the FBI's first attempt as using keyloggers, I would be shocked.
A smart suspect would not run their encryption software on a networked machine. Mail from Aunt Pat + encrypted illegal activities = disastrous for suspect. And there are ways around the installation of keyloggers during a raid. It may get installed, but I imagine that a savvy criminal could tell what processes/software runs on their machines and whether it has changed.
posted by xyzzy at 7:43 AM on November 21, 2001
A smart suspect would not run their encryption software on a networked machine. Mail from Aunt Pat + encrypted illegal activities = disastrous for suspect. And there are ways around the installation of keyloggers during a raid. It may get installed, but I imagine that a savvy criminal could tell what processes/software runs on their machines and whether it has changed.
posted by xyzzy at 7:43 AM on November 21, 2001
« Older Wait til he finds out | If you can smell your neighbor's cigarette smoke... Newer »
This thread has been archived and is closed to new comments
I guess the only way around this is to copy your encrypted email onto a floppy and do all your encryption/decryption on a seperate computer, an old pentium 120 could serve as this. I would keep the pentium 120's hard drive locked in some safe when not in use, and everything on that encrypted too.
posted by bobo123 at 8:56 PM on November 20, 2001